Press registration

Press registration is open to any member of the broadcast, print and Internet media who can prove they work for an organization or publication that covers computer security on a regular basis. At the conference we will provide a press room with Internet access and electrical outlets for laptop computers. If you need a separate room for filming interviews, please request it in advance in the comments section. Let us know if there are any other special needs such as speakers you want to interview when you arrive or other items such as computer access to file stories or a fax machine.

We welcome anyone to apply for press credentials but reserve the right to deny you a pass. As such, please be prepared to show us copies of your articles either at your publication's Web site or on the publication's masthead should we request it.

At the show, please be able to present a business card, and government issued picture id, article on your organization's masthead and contact information for your assignment editor should we need it to validate your credentials before issuing you a pass.

Press registration may be granted for the conference and working sessions seminars only. There are no press passes available for Training.

Please make a point to pre-register. Should you attempt to attain credentials on-site, we cannot guarantee you will qualify and must bring all information in the above paragraph.

Media Resources for Working Sessions

The following text is being provided by the chairs from each of the OWASP EU Summit 2008#WORKING_SESSIONS_-_November_4th_.26_5th_.28Tue.2C_Wed.29. It explains why the working session is important, why it matters to the industry and what might be the beneficial outcomes. We hope to have public/industry information from all the working sessions here in due course for advanced publicity purposes.

OWASP Documentation Projects

Briefing Text

The working session on OWASP Documentation Projects is a great chance to understand how the set of OWASP related documents can be used as a toolset to promote security on software development and management. The outcomes from PCI DSS v.1.2 and other standards that will come form the market, shows how important is to understand the importance of protection measures on coding and how these actions will come back in high quality products that can reach the market in a more adequate fashion.

The outcomes will promote OWASP documents in the market and to be part of it will make the difference for your company, your career and your personal contribution for the security community.

The working session for OWASP Tools will address standards for Tool development at OWASP. This is will include standards for documentation, supporting tools via Books, How-Tos, Webcasts, Podcasts. We will also dive deep into the OWASP Project Assessment.

Governments, businesses and people rely on the Internet - the Internet has almost become something we cannot live without. But the Internet suffers from one terrible flaw: it's insecure. It's insecure because we've
rushed into creating a global network of computers without making sure we knew what we were
doing. The Open Web Application Security Project (OWASP) is a global open community dedicated to
enabling organisations to develop, purchase, and maintain applications that can be trusted. All of the
OWASP tools, documents, forums, and chapters are free and open to anyone interested in
improving application security.

There are people and groups working in this area who are doing battle for all of us every day, yet many are
unknown outside their own specialist areas. The proposed OWASP Awards could be used to thank and recognise outstanding contributions,
identify those who are raising security awareness and highlight those supporting security initiatives such as
promoting better practices.

The courses provide an overview of the Flash Player security model and common architectures for Flash deployment.
The course is targeted at people who need to understand the fundamentals of Flash Player security and how it will affect their website such as CSOs, web designers, Flash authors, web-site auditors and web architects.
The goal of the course is to provide the student with the enough information to architect and audit a secure Flash deployment.